IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients. The use of a fee for e-mail has sometimes been called e-mail postage, e-postage, sender pays or e-stamping.Both America Online (AOL) and Yahoo have announced certified  … 
Definition continues below.
Email SecurityReports
151 - 175 of 288 Matches Previous Page  | Next Page
IT Decision Checklist: Messaging Security
sponsored by SearchSecurity.com
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

SearchSecurity.com

Why Cloud-Based Security and Archiving Make Sense
sponsored by Google Postini
WEBCAST: Join us for this live webinar on 'Why Cloud-Based Security and Archiving Make Sense'. We will address the critical and growing requirements for better email security and email archiving, as well as illustrate the benefits and cost savings of a cloud based approach to managing both.
Posted: 03 Jun 2010 | Premiered: Jun 3, 2010

Google Postini

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks
sponsored by M86 Security
WHITE PAPER: Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.
Posted: 27 May 2010 | Published: 30 Oct 2009

M86 Security

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Managing PST Files: From Discovery to the Archive
sponsored by C2C Systems
WHITE PAPER: As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files? 
Posted: 20 May 2010 | Published: 20 May 2010

C2C Systems

EMC SourceOne for Microsoft Exchange Server 2010
sponsored by EMC Corporation
DATA SHEET: Microsoft and EMC provide compelling new capabilities for managing your Microsoft Exchange 2010 e-mail, while meeting security, compliance, and eDiscovery requirements.
Posted: 03 May 2010 | Published: 03 May 2010

EMC Corporation

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Microsoft Online: Exchange Online Forum
sponsored by Microsoft
INFORMATION CENTER: Access this discussion board to get with some of the most relevant tasks related to understanding, setting up, and using Microsoft Exchange Online. It will cover capabilities and operation of Exchange Online, both Standard and Deskless.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Microsoft

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro

Cloud Computing: Best Practices for Migrating to Microsoft Business Productivity Online Suite
sponsored by Dell Software
WHITE PAPER: In this new white paper by Quest Software, learn the best practices for migrating to Microsoft Exchange Online and SharePoint Online from any legacy platform. See why organizations like yours are moving to BPOS. Read this white paper today.
Posted: 30 Mar 2010 | Published: 30 Mar 2010

Dell Software

State of Internet Security, Q3 - Q4 2009
sponsored by Websense, Inc.
WHITE PAPER: Do you know just how adept Web adversaries have become in using the Internet to spread malware in their attacks? Understand where the true threats lie with this report which summarizes the significant findings of Websense researchers using the ThreatSeeker™ Network during the six-month period ending December 2009.
Posted: 16 Mar 2010 | Published: 16 Feb 2010

Websense, Inc.

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Insight

Presentation Transcript: Showdown in New Mexico, Google Apps vs. Microsoft Exchange
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this presentation transcript featuring James Ferreira, CIO for the New Mexico State Attorney General's Office, to learn about migrating to cloud computing applications.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Google Apps

Securing the Borderless Enterprise
sponsored by Websense, Inc.
PRODUCT OVERVIEW: A completely integrated unified security solution will address Web and email security threats associated with new communication and collaboration tools. It will mitigate the risk of losing valuable business data. It will eliminate the complexity of deploying, managing, and maintaining multiple legacy security products. Read on to learn more.
Posted: 18 Feb 2010 | Published: 04 Feb 2010

Websense, Inc.

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL

Presentation Transcript: Exchange 2010 Roadmap Series - Backup and Recovery
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In this presentation transcript, featuring Exchange pro, Lee Benjamin, you'll learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.
Posted: 21 Dec 2009 | Published: 21 Dec 2009

Dell, Inc. and Intel®

Key Considerations for Migrating to Exchange 2010
sponsored by EMC Corporation
WHITE PAPER: This white paper addresses the key issues that decision makers should consider as they plan their Exchange 2010 migration. It discusses the results of an in-depth primary research survey conducted by Osterman Research that explores how decision makers are planning their migration to Exchange 2010.
Posted: 21 Dec 2009 | Published: 01 Oct 2009

EMC Corporation

Supercharging exchange with solid state without breaking the bank
sponsored by Fusion-IO
PRESENTATION TRANSCRIPT: This presentation transcript on Exchange is exciting because Exchange is so expansive in so many different organizations across the world itself. We will talk about the opportunities for Exchange, what we see in terms of the broad market place and how Exchange appointments are going to increase over time.
Posted: 16 Dec 2009 | Published: 16 Dec 2009

Fusion-IO

Presentation Transcript: Considerations for IT
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Read this transcript of the 'Considerations for IT' podcast to learn why companies have chosen Google Apps to improve their IT infrastructures. Learn which technical and business factors drove one company to adopt this technology. Determine how this technology can be used in your IT environment to improve Web application performance.
Posted: 15 Dec 2009 | Published: 15 Dec 2009

Google Apps

Exchange 2010 Roadmap Series: Backup and Recovery
sponsored by Dell, Inc. and Intel®
WEBCAST: In this expert mediacast, featuring Exchange pro, Lee Benjamin, learn how to improve backup and recovery of your Exchange environment. Discover the new features of Exchange 2010 to enhance your backup and recovery efforts. Find out what you should know about clustering and how to avoid common pitfalls.
Posted: 09 Dec 2009 | Premiered: Dec 9, 2009

Dell, Inc. and Intel®

Prince George’s County School District Streamlines Email Investigations and Boosts IT Productivity with Google Apps and Google Message Discovery
sponsored by Google Postini
CASE STUDY: In March 2008, Prince George's County Public Schools ran a pilot of Google Apps Education Edition. In this case study, you'll learn how they used it to dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system.
Posted: 03 Dec 2009 | Published: 03 Dec 2009

Google Postini

Presentation Transcript: Legal Discovery and Your Messaging Environments - What's Important and Why!
sponsored by Daegis
PRESENTATION TRANSCRIPT: In this presentation transcript, learn how Lotus Notes Administrators play an important role in legal discovery. Find out how archiving systems can help meet compliance standards and gain an understanding of business requirements around e-discovery. Discover how to make sure your company’s information is properly archived.
Posted: 02 Dec 2009 | Published: 02 Dec 2009

Daegis

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Email Security for Midsize Organizations
sponsored by McAfee, Inc.
PRODUCT OVERVIEW: Whether you address all five areas in a unified approach or concentrate on strengthening your email protection, McAfee has proven products and a dedicated focus to meet the requirements of your organization.
Posted: 24 Nov 2009 | Published: 11 Aug 2009

McAfee, Inc.

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by McAfee, Inc.
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

McAfee, Inc.
151 - 175 of 288 Matches Previous Page    5 6 7 8 9 10    Next Page
 
EMAIL SECURITY DEFINITION (continued): …  e-mail plans based on a technology developed by Goodmail Systems. For a fee of approximately 1/4 of a cent (USD $0.0025) per e-mail, or USD $2.00 to $3.00 for every 1000 messages sent, advertisers can post e-mail messages that defeat most spam filters commonly used at the server level by Internet service providers (ISPs). Proponents believe that certified e-mail will, if effectively used on a large scale, make spam unprofitable and thereby improve the operation of the Internet by reducing useless electronic traffic.Critics of certified e-mail insist that such a system is not likely to be effective … 
Email Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement